Metasploit-AI is a cutting-edge cybersecurity framework that combines the power of Metasploit with advanced artificial intelligence and machine learning capabilities. Designed for cybersecurity professionals, ethical hackers, and penetration testers,
☆55Aug 9, 2025Updated 9 months ago
Alternatives and similar repositories for metasploit-ai
Users that are interested in metasploit-ai are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Advanced mobile security research platform for authorized testing and educational purposes☆47Oct 4, 2025Updated 7 months ago
- Yet another machine learning-based WAF research☆26Jun 21, 2022Updated 3 years ago
- Modern cybersecurity tools platform built with React and TypeScript. This provides a collection of essential security tools with a sleek,…☆26Jul 19, 2025Updated 9 months ago
- Bug Bounty Setup Tools On Fresh VPS. This scripts automatically installs top bug bounty tools and set up environment in newly installed …☆32Jan 27, 2026Updated 3 months ago
- NMAP-AI: AI-Powered Network Scanning & Automation Platform 🤖 Revolutionizing network scanning with AI-powered automation, intelli…☆97Feb 14, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Lightweight BApp that seamlessly integrates powerful LLM-scanning capabilities into Burp's built-in Scanner with improved accuracy. Suppo…☆40Aug 4, 2025Updated 9 months ago
- HackGPT Enterprise is a production-ready, cloud-native AI-powered penetration testing platform designed for enterprise security teams. It…☆818Feb 14, 2026Updated 2 months ago
- RedAudit is a next-generation Windows forensic and security assessment framework featuring a live cyber-operations GUI built for real inv…☆35Nov 15, 2025Updated 5 months ago
- Termux-penv: A tool to install and manage 32-bit and 64-bit Termux chroot environments for cross-compilation and multi-arch testing on An…☆16Dec 28, 2025Updated 4 months ago
- JSON2YAML is a Python-based utility that simplifies the process of converting CVE (Common Vulnerabilities and Exposures) data from JSON f…☆12Feb 10, 2025Updated last year
- CTI Cyber Threat Intelligence OSINT Dark Web Deep Web Research. Ransomware gang information gathering tool.☆152Dec 19, 2025Updated 4 months ago
- ☆12Apr 3, 2023Updated 3 years ago
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Oct 13, 2022Updated 3 years ago
- Precompiled binaries for windows & Linux☆38Apr 19, 2026Updated 2 weeks ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- My solutions for pwn and reversing challenges☆11Mar 18, 2018Updated 8 years ago
- ☆42Nov 6, 2025Updated 6 months ago
- e2e Scanning research module☆25Mar 26, 2026Updated last month
- HackTheWeb is a production-ready, AI-powered web application penetration testing tool designed for security professionals and ethical hac…☆35Oct 5, 2025Updated 7 months ago
- Cyber Threat Intelligence☆79Dec 7, 2025Updated 5 months ago
- Challenges for ImaginaryCTF 2025☆25Sep 7, 2025Updated 8 months ago
- A collection of awesome penetration testing resources, tools and other shiny things. With repository stars⭐ and forks🍴☆23May 2, 2026Updated last week
- CVE-2025-3248 Langflow RCE Exploit☆17Jun 17, 2025Updated 10 months ago
- WPF helper library☆14Apr 6, 2019Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Just "Harmless" Google dorks for bug hunters☆23Nov 25, 2024Updated last year
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 10 months ago
- ☆16Apr 17, 2025Updated last year
- BurpSuite MCP Server: A powerful Model Context Protocol (MCP) server implementation for BurpSuite, providing programmatic access to Burp…☆78Apr 29, 2025Updated last year
- ☆19Jul 9, 2021Updated 4 years ago
- CVE-2025-49144 PoC for security researchers to test and try.☆86Jun 30, 2025Updated 10 months ago
- A chess engine made in rust cause I hate myself☆11May 30, 2025Updated 11 months ago
- Creating a Fake WhatsApp Message via SQLite: Understanding the Logic Behind the Manipulation☆40Jul 28, 2025Updated 9 months ago
- DoS Attacks on Bluetooth Devices for pentest purposes☆35Nov 22, 2025Updated 5 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- TikTok Mass Report Tool Automated reporting for accounts and videos with proxy & multi-account support☆19Apr 27, 2026Updated last week
- TradingView suite with 15+ indicators and Python scripts generating up to 130,000 combinations, optimized to 3,000 with robust analysis. …☆20Apr 27, 2026Updated last week
- ☆23Feb 14, 2023Updated 3 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- ☆10Apr 1, 2025Updated last year
- ☆97Jul 10, 2025Updated 9 months ago